Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 23:41
Static task
static1
Behavioral task
behavioral1
Sample
d311c7271abe60a8763a9ebbf9c6c538_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d311c7271abe60a8763a9ebbf9c6c538_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d311c7271abe60a8763a9ebbf9c6c538_JaffaCakes118.html
-
Size
346KB
-
MD5
d311c7271abe60a8763a9ebbf9c6c538
-
SHA1
e51bf5c2ac13d086e54ef77a3d43f1ad1ff20e10
-
SHA256
be463b58dd58d79246c60e097dded0d42d80e523d4dbdd95e3996e0e1dde5c4b
-
SHA512
5b9fe1aaeb4febc8f367e749b3db03b10c662d4db529339a6085f130ff5dc757dc9b3c85a6060dad4c03d17d49c3d40822da871ea96b71b021fda0d3192f5b4c
-
SSDEEP
6144:SGsMYod+X3oI+YbRsMYod+X3oI+Y3sMYod+X3oI+YQ:p5d+X3pd5d+X3Z5d+X3+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A45CB0A1-6D72-11EF-B984-5A85C185DB3E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc50000000000200000000001066000000010000200000003b5ce060691c686c39abcdba9d2114d767da5841b65c9aa46bc3375234fc20be000000000e800000000200002000000016c67edc20fb4cff6efa7da783b83e72476f485639120ebcaa065c7e9fe80d9b2000000026df2f1b2847c55470078b891436d1766480b0ccdd8598af894d41bbde54d93e400000002b22faf7f6ede519b9346553717817c8c91632d967acd8bd391886ae7a2794b92168ff56c84362b9a04d3a4efb755b50e77855826f624ab82cbb735682267f9f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431914330" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0bc06847f01db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000303eef0e2cd1a9499efdd285a56ddc5000000000020000000000106600000001000020000000e456c0529e55dd3a401e5ca6589577bb6a5e4c25ccea748b2c18bf98897ac0e2000000000e8000000002000020000000b142ea78a59359b3f6104cc94e664b85960e2693c6c1635dd843f46e3adf49f4900000006f646643db18c1f38194c4b836a267e351d6f5de3d0691b476fd9ded57654c5ff38d3f2ed0cbb0a71de25dd355e380a2a6b18c5c607ff9f1887674dd8a7597f641bb727194494108c6ae610e3108b1e9cf2dc7afd12cb18882e6a0dc9dbe64db8837763d53d32c183a9050a07fb4046b47effe3ad16d899a584daee43b484b9dc4b57783b155386bdbc7338eebba1a5e40000000728adccdc0a64a34bf90c018d7697816d1a53998ee2185e8036a2d665914671c31148c9023d3ca9a9e929ec01a595875543be7403d40e4e917b3761640bdc3b7 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2304 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2304 iexplore.exe 2304 iexplore.exe 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE 2964 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2964 2304 iexplore.exe 30 PID 2304 wrote to memory of 2964 2304 iexplore.exe 30 PID 2304 wrote to memory of 2964 2304 iexplore.exe 30 PID 2304 wrote to memory of 2964 2304 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d311c7271abe60a8763a9ebbf9c6c538_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2964
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa9358675ba31f00cb621edde25c78d2
SHA137d3a710bd03906ba0ce4f3422b6ce42e5ecf522
SHA2563d288302d6b7df62c708ebec1401f602916829a74d79babbd0c39f24ec91ce71
SHA5124e994d0714a9fd70e05e16b1e767d64e8f74d55afd3112083e14dbc3f22e8a71dd5cf4748360b78874a84862a1a8172a8ac1513e92e5cbf25d1ff2d9dd4295d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eceae0abb5a36b8fbe98a8d316cb11c4
SHA1197413fb48912a091bcc875e0ffda6413b451b4a
SHA256273c9563a69b90445ca0ebebd044d38a8cde22808ac9383ab51baef14ce48a13
SHA51244b5649530700278de9579cadf477f807b5af090a6b4d44ae0632cb3d589b89fe1f9829951edd09af4c2ab14c249dcda067ad11b4564dc4301a653f645f9fb88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a61ce387460e6e80f5bee48eba690079
SHA1db3f3a7436e3bb2576a6b1a0a42c430c1df356aa
SHA256ff959c050a1b84a3b59627b7bbd19e1aac64c7e05afd12b452fc26a61be90495
SHA512c3bf725f7d23e0b0693a52e253e73244519ca31d1eaa342abf38687cd626c23811eb720a12dd1fbec58477f27b7e8db953e5b3e49d42282d9d9cd775a3331e82
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ee412f2d4e8f66da2535d3fe22d29789
SHA18a7b0096fd16a56a2c859bb0d3d866d474ed99e9
SHA256618642ba96af71876873800e9a01379a99fd74f32dd285e84f5d1b39dcfd2b08
SHA512995b469cf45724267c6e951d13839811f91b8e72d724532d00e75e9489dab56fbd453bb7bf03740b6bf2b77497f92a6aa25409bdf78c5ec8c27ef102a4b8e090
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f05e4523ead23125bdf9ce4966a8d6e8
SHA1f286c3756ba00855da59c706fff8f943ca88fd1a
SHA256cabbbb7c06f6727a75196b4f9e4406fb58cc9976107479bd5503a751ab17a80c
SHA512c0c32ebb976481c8b746c6c33565bbd17d06d966464ac7e45ec43cab5d891666ccf1b600f21576c31173266e36d9390d25fec7c5bdadcee4a6837172665a50c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a0bffa374a4b1979bbc685efb558ed82
SHA1a37bfd5f9897fe3d2e4f9fd13daab8a83c4f1667
SHA256f63763f30b8ed83e3e74590d6548fc1c8fdb9b4b902b9b94adfd70a81d330bc1
SHA512af6a6196c67c1e15ad7c7fc1d5d700d47b0a911f0dcfbcc848edb2bc00487d91343189f2a75ecd89dd3f8527cfd9e9180279d83298cacb66b7b94b45d48df28e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541c23aa58560d3fbeb648297614bbec2
SHA16ec9318fb051b4ad66621f19ab6d8f29d62f3fd1
SHA2568d6d5c84c4de15a1f1c749d9bf8db3d4d9c5c8c72f008f5a530f790ea37138ac
SHA5128209cd30f2295c1ac1a75353e1d46f45ffca105d31fa240a949485747e417efd6271663170dba16099bb3c008c32d05d2500440d9640933b89b4255eef1c111a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592619300d3b1cc3feb73f31f54825a0b
SHA1b3726c1be426b2e518ea12a43cf1c6273ce4a2f7
SHA25696e439dfb98fdc605362134767966ae7a115f51484cf0efa70a216f428854cdd
SHA512fce0e349c531a4d76af4b50b0afba7ecd861947e87404c6d249bb9e835ddca473969f84396edbb1d301208af26463e712e1a145ea685f099a05cde3e8ed12d48
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5619a3f86854a013632ba70e2cd41370e
SHA14dea413c5b01738ff75ea643ddcb5dc9f678441c
SHA256af20e6d457cef57daf18b03c6c6f7303a8bb6ad41165208667591cd247c161ed
SHA512b307b568b11598dfcc8255d26859cbf7fc0e48c9cb7ff4915de0e12148e4f99d2778ee88757c3e5ec79d931397ad97d85aa29dcc95587595a6e83a5949f615ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c82900c801f1d12a234d2cbc87d0ee76
SHA19e7243ea402cee0699115fc9c6c3ed05f5a799c7
SHA25621e85a71b9dee90ff5c5dbda902032f62773c1fc635a5445214920eb46553240
SHA512180641103d7932e5f2e9c38ff0a5468657184197ba8c2daad5544a43eab74f673bcfa026dbb7afe4df713600dd542a8126c31ce7cdc5c66e499ed681b9caa5ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5432ad0f786dc7d0a9308990f7e7777ef
SHA1c20eae4bfce393e7521903da736ba4ce8d6f2fff
SHA256eb2c603824844880c901425342fb188fcafbc7beb9e401444587af148c6af825
SHA512a9ce6f34bc47ebda3f77544aed3d026b230009d6cc874b3ded514915708d68944610ca9a138147f512be501d46911cd6b0fc43ebad36912c80d9a4e6c43526c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57098f3a61d33681913dccae2023ac7fb
SHA1f454565ff36cdd1e37624df2570d0e10e60a86dc
SHA25678a1ab86e8158ffa2fe693964c0de6a776dd760c2bb2fc03dfe1c2e731a98536
SHA51240f7f6a8f7b521adacc0d58159a1d1062131830bf63ba0aa3d5a96f48e7612325a1c71a2e431744652b8ff4c99eca70199cbe17cc16e57c4d3cdb71f98cabb8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD515708a65d79cb4d57f9fded10862c8bf
SHA15ca8ae92fb01e67ccf5e6d8666a1dc981a7d85ba
SHA256c740930e1181d7665db5235ac97b0968866be28877a59de499808341f54e0593
SHA512affe8330d0962159036e4a0a64e2beac619a8306214342cbf363aea0b49f7f399d298430e9cb8d9d3a69451993e5c0d7c41bec446d06d0154b4478adadc984ca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD521c3acaf78bdae119379cc1deed37565
SHA178e183b2aabff264c3df3fc68331a1893ec3d5e8
SHA256e2de4c43ebdcc5ac32177b1187df7a6efd95ab48b69e49e6efbbe3dbf521b0a4
SHA5129ba4df4c887e4c51b6c997a90197c328fb085973d1482ae5c0f21074259f4f34ec28f7ee000c5a1ae369bd73a3dfc58f76e0c9aa46e5e6a6f49e802280c02de8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575f2bfe369c521b8a0a252f5d6890ff3
SHA16910ccd8aea39bc63b9a14150dd94eb05dae126a
SHA2566481e55c48c9295b3cbc5cfab05ac3adb883e1f4d851aa228d851182425682eb
SHA5123a9c33a609ff5b720da1b2a749275d0283e9da81003de6fe89ad531d9c7ee4b762365ad4e701309c8371d3218f9c5037f11116bf1b5d5eb40339c95709e43dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ae053e43e22448dc1644e6c26bb1a58
SHA150e2d7305f4bd512493872c337523abff8f1d416
SHA256c89a21a46b3355608c6df80b1a411201b4e3170ab1e1f1f3d9b12eeeda9ca40a
SHA512081d144601732442cf539b0d16b90cdb5eb898866d09e2b6c614410b6d5c84214599f6de321fc19a371091380959bf20c1ea6c9a44e4c14e74cc5ad587123f3a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aeffde73199649582138aec3c54ae39a
SHA1ff1c78c7db6bff740c6cac0117f5a6fcf2283911
SHA256dacbc4c219479ea041390b4e55356bd350aacc07b27957b3ba80a76900b84d0b
SHA512b06dc337196023c1b79baaf7d69ac608f9d664f8cb87d22d8dbe4c373899dfe61d1eb50249bf406c1d6125995537e7b2116b4025164711fb66b71420eb002fee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5caec9a745fa1c0e8a5710c61eede875d
SHA1e765c0d2d0f128deee669a3b792c9c491b628524
SHA256c3d53d46d25198c4cbc7593ecf6d4cba663900e6de131fd2e6f02c711452b764
SHA5127b22ed2519139bb1f064f3c9660e517b6ea35bd38373105ad5412a649425967549e7265d0e58d2a9ce2682902ed7d88f51660812b2c3226fb3fc3c570cfddaa0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58ad512120433fe61e2e446387543dbbc
SHA1bd5051b73b18dc6c67cd50353bd17e703524fc9e
SHA256a364ed41ac35609ca7d83eec5a8b051f7ab5b0da5bd6fc41f253d089d92e0260
SHA5127f2fb962d782343ecebbc1c2df653d3dc9ccd29bf46f706589ecceb308effe01f221cf1483f30e67d550ebcae72314bd218c74288b9aa939cf4b8893fb1d0d5b
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b